Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Anish G, Prof. Sharadadevi Kaganurmath
DOI Link: https://doi.org/10.22214/ijraset.2022.45830
Certificate: View Certificate
A financial transaction is an agreement, or conversation, entered between a purchaser and a dealer for the trade of an asset for virtual processing of payments. E-cash (digital money) is the crucial fee way in digital exchange, this is seen as the same as coin in the real world. A financial transaction is one wherein there is some kind of pastime that modifies the rate of the property, liabilities, or owner\'s fairness of a business enterprise. The ones styles of transactions are - component transactions which includes a buyer and a seller, and that they usually include cash in some way. The aim of this work was to develop a systematic ordering, comprehensive and classification of issues in the area of financial services. Spring Boot is used for the implementation of the product and it is developed with the help of swift messaging standard for easier transitions and efficient transactions. A customer will subscribe for the service which is provided by the customer service provider. The customer will have to pay the monthly fees for that service. It will be automatically debited from the bank account. The work of this project is for the customer to review the billing amount and also request for billing date extension and request for bill cancellation if needed. The complete process is divided into two parts which are inbound and outbound. There will be a queueing process which picks the customer the query and processes it one by one. The customer will initiate a query and after all the verification and validation the response will be sent to the customer.
I. INTRODUCTION
The global financial services market is about to grow from $ 20490.46 billion by 2022 to $ 22515.17 billion by 2024 with a total combined annual revenue. This growth was mainly due to businesses reorganizing their operations and improving the impact of COVID-19, which had led to restrictions affecting social isolation, remoteness, and closure of industrial activities that led to difficult working conditions. In a business, there are primarily four different sorts of financial transactions. Sales, purchases, receipts, and payments are the four different categories of financial transactions. Sales are the settlements that take place when property is transferred from a buyer to a seller in exchange for cash or credit. Sales transactions are documented in the seller's accounting journal as a credit to the sales account and a debit to cash or accounts receivable. Purchases are the transactions that a business must carry out in order to acquire the items or services necessary to achieve its objectives. Cash purchases result in a credit to cash and a debit to the inventory account. A written acknowledgement that one has received or taken into one's possession a specific quantity of goods or money is referred to as a receipt. Payments are the transactions in which a company exchanges money for a service or product. As a credit to cash and a debit to accounts payable, respectively, they are noted in the accounting journal of the company issuing the payment. BSPs, also known as Merchant Service Providers, are independent firms that assist business owners in accepting a variety of online payment options, including cash cards, credit and debit cards, e-wallets, and online banking. Let's walk through a basic online transaction to illustrate how a BSP operates, starting with the moment the transaction is initiated and ending with the moment you see the money in your account:
II. LITERATURE SURVEY
Electronic commerce and the simplicity of present transactions have resulted in a massive increase in credit card acceptance among users from all sectors of life. However, despite their tremendous benefits, users are still hesitant in using them, particularly for online transactions, due to the rising rate of credit card theft. Several security models for secure online payments have been suggested and implemented, however the exchange of confidential credit card data via the Internet has made electronic payments susceptible to cyber attacks. We explore and assess recent advancements in online authentication procedures, such as fingerprinting, one-time-password systems, and cardholder authentication using mobile devices and the Public Switched Telephone Network, in this study. This infrastructure is more comprehensive, robust, and user-friendly, and it does not necessitate the installation of specialised hardware at the customer's location. Researchers offer a framework for an electronic currency system in this paper, which provides a combination of anonymous transactions with digital payment procedures. The paper begins with a discussion of a hypothetical UML-based model for an electronic cash system. The implementation issue is then addressed in Java using standard cryptographic packages. Atomicity is required for dependable and trustworthy electronic commerce processes, as well as to safeguard the welfare of users. Determined by the standard e-cash method, an instantaneous and economical e-cash (electronic cash) transaction protocol is proposed. The protocol integrates the delivery of digital items into the payment process. With the exception of ensuring integrity at all three levels, the innovative protocol boasts exceptional efficiency and technical feasibility, owing to the removal of unfavorable strict assumptions. In addition, the recommended protocol includes non-repudiation proofs in anticipation of future disagreements. Finally, a study of atomicity and performance will be shown. The study examines, recommends, and illustrates ways for enhancing the security and safety of financial transactions via electronic payment cards by programming the card transaction limit utilizing mobile technological devices. The usage of digital electronic payment cards for numerous payments and transfers of needed income from bank accounts provides users with convenience it offers. However, there are issues with the security and safety of financial transactions while employing electronic cards. The use of mobile technologies to enhance the security and protection of bank electronic card transactions is advocated and illustrated. As a result of the procedure, transaction limits for the electronic card have been programmed using smart phones and mobile platforms. The mobile application's architecture, functionality, advantages to both the bank and the user, and how to utilize it are all outlined. Transaction-based e-cash has replaced the traditional cheque transaction due to the rapid growth of technology, networking, and computing infrastructure. The fundamental issue in recent years has been the effectiveness and security of the e-cash system. Based on the system technologies of authentication mechanisms and blind signatures, this study presents an effective and equitable anonymous off-line electronic payment system. Furthermore, based on the system's and related systems' safety analyses, it contains numerous security mechanisms such as anti-counterfeiting, anti-tracking, and anti-repayments.
III. METHODOLOGY
The complete implementation of the project is divided into two parts:
A. Inbound Flow
Yaml file should be prepared before the development. Yaml file is given as the input from that yaml file to generate pojo classes. The request to Inbound CSI will be called to the signature verification happens and once the signature is passed then it will be moved to schema validation. All the validation will be carried out. Once the validation is done then the core update for the system Api is called and from there database verification and insertion is done. The data is stored in oracle DB and the DB updates are done and then the rnque process happens. All these processes are carried out by Csi flow config based on the index number. This will complete the inbound flow.
B. Outbound Flow
Outbound is the second phase after the inbound process is done. In csi we have a listener that listener will pick up and it will retrieve from the queue table and it will send the Data to the Get system API call and from get system all the data will be retrieved from the database. Then it will be sent to the stubs. In the stubs we have schema validation and as well as signature verification. Then the stubs will send the response to the event api. The event api will be the last Api called so it will update the db and at the end there will be a response sent to the end user.
IV. SYSTEM ARCHITECTURE
The consumer will send a query to the Consumer Financial Institution(CFI) regarding the Biller Financial Institution(BFI).The CFI is responsible for managing the consumer mobile banking application, consumer accounts and Payments Interface. The CFI will directly connect with the BFI,which is responsible for maintaining the corporate accounts and Payments Interface. Payments Interfaces are connected through a Gateway. The Biller Service Provider(BSP) maintains the Invoice docs and Bill Payments. API Gateway bridges the Zapp Platform and entire System Architecture. The Zapp Platform receives the data in the form of REST XML or REST JSON which is usually termed as Yet Another Markup Language (YAML) files. YAML files will be used to create the pojo classes and based on that pojo classes. Consumer Service Interface or Customer Service Interface which acts as a router between the Frontend and Backend. High Security measures are maintained. A complete security module is present for the Consumer Service Interface(CSI). CSI calls the DB operations. The core database used is the Oracle DB which helps in the database operations, where Insertion, Deletion, Updation operations are performed.Master Data Management acts as the central repository which holds the entire company details. Edit permissions are not given for users to edit the Master data management. Batch Process accepts multiple requests from the users at the same time, but processes each request according to First Come First Serve(FCFS) criteria.
V. RESULTS AND ANALYSIS
The project was focused on implementing the query initiation and response api. The process will start from the customer service interface and then be passed to the security layer. Then the response will be sent to core database where the DB operations will take place and sends the response back to user.
???????
The aim of this work was to develop a systematic ordering, comprehensive and classification of issues in the area of financial services. The project deals with the implementation of the financial transaction which are used in money transfer or payment for services. The project explains in detail about the workings of the financial transactions. A customer will subscribe for the service which is provided by the customer service provider. The customer will have to pay the monthly fees for that service. It will be automatically debited from the bank account. The work of this project is for the customer to review the billing amount and also request for billing date extension and request for bill cancellation if needed. The complete process is divided into two parts which are inbound and outbound. There will be a queueing process which picks the customer the query and processes it one by one. The customer will initiate a query and after all the verification and validation the response will be sent to the customer.
[1] N. J. Yuan, Y. Wang, F. Zhang, X. Xie and G. Sun. Reconstructing Individual Mobility from Smart Card Transactions: A Space Alignment Approach. IEEE 13th International Conference on Data Mining (ICDM 2013), pp. 877–886, 2013. [2] G. Kortsarz, R. Krauthgamer and J. Lee. Hardness of approximat- ing vertex-connectivity network design problems. SIAM J. Comput., 33(3):704–720, 2004. [3] K. Zheng, Y. Zheng, X. Xie and X. Zhou. Reducing Uncertainty of Low- Sampling-Rate Trajectories. 2012 IEEE 28th International Conference on Data Engineering (ICDE 2012), pp. 1144–1155, 2012. [4] Y. Ye, Y. Zheng, Y. Chen, J. Feng, and X. Xie. Mining individual life pattern based on location history. In Proceedings of the 10th Interna- tional Conference on Mobile Data Management: Systems, Services and Middleware, pages 1–10, 2009. [5] S. Bakhtiari, A. Baraani, M.-R. Khayyambashi, \"MobiCash: A New Anonymous Mobile Payment System Implemented by Elliptic Curve Cryptography\", Proc. of the WRI World Congress on Computer Science and Information Engineering. CSIE\'2009, Volume 3, pp. 286 - 290,2009. [6] S. Canard, A. Gouget, \"Divisible E-Cash Systems can be truly Anonymous\", EUROCRYPT, LNCS 4515, M. Naor (Ed.), pp. 482-497, 2007. [7] J. Camenisch, S. Hohenberger, A. Lysyanskaya, \"Compact E Cash\", www.cs.brown.edu/-anna/papers/chI05-full. pdf, 2006. [8] D. Chaum, A. Fiat, M. Naor, \"Untraceable electronic cash\", Proceedings of Advances in Cryptology (Santa Barbara, California, United States). S. Goldwasser (Ed.) Springer-Verlag New York, New York, NY, pp. 319-327,2015. [9] P. S. Gemmell , \"Traceable e-cash\", IEEE SPECTRUM, February, pp. 35-37. [10] J. A. Hansen, \"Adding privacy and currency to social networking\", Proc. of 8th IEEE International Conference on Digital Object Identifier (PERCOM Workshops 2010), pp. 607 - 612, 2007. [11] F. -G. Jeng, T. -L. Chen, T. -S. Chen, \"A Blind Signature Scheme Based on Elliptic Curve Cryptosystem\", Proc. of 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 2044-2049, 2009. [12] H. J. Lee, M. S. Choi, C. S. Rhee, \"Traceability of Double Spending in Secure Electronic Cash System\", Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC\'03), pp. 330 - 333, 2003. [13] Anshuman Mohanty, Pranav Giria, Saptaswa Pal, Vishruthi K Acharya, “NFC Featured Triple Tier ATM Protection”, 978-1-5386-5657-0/18/$31.00 c 2019 IEEE. [14] D. R. Simon, \"Anonymous communication and Anonymous cash\", CRYPTO\'96, N. Koblitz (Ed.), LNCS 1109, pp. 61-73. [15] C. Wang, R. Lu, \"An ID-based Transferable Off-line E-Cash System with Revocable Anonymity\", Proc. of International Symposium on Digital Object Identifier, Electronic Commerce and Security, pp. 758 - 762,2008. [16] X. Xiao, Y. Zheng, Q. Luo, and X. Xie. Finding similar users using category-based location history. In Proceedings of the 18th SIGSPA- TIAL International Conference on Advances in Geographic Information Systems, pages 442–445, 2010. [17] M. C. Gonzalez, C. A. Hidalgo, and A-L. Barabasi. Understanding individual human mobility patterns. In Nature, pages 779–782, 2008. [18] R. Daniels, and C. Mulley . Explaining walking distance to public transport: the dominance of public transport supply. In World, vol. 28, page 30, 2011. [19] R. J. Bolton and D. J. Hand Statistical Fraud Detection: A Review, Statistical Science, 17(3), pp. 235-249, 2002. [20] Abhinav Muley, Vivek Kute, “Prospective solution to bank card system Using fingerprint”, Proceedings of the Second International Conference on Inventive Systems and Control (ICISC 2018).
Copyright © 2022 Anish G, Prof. Sharadadevi Kaganurmath. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET45830
Publish Date : 2022-07-20
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here